Electronic Security Issues: Protecting our Electronic Life from Social Engineering Attacks
The essential need for security is apparent to organizations, government and individuals. Whether it is to secure a company's assets, abide by a law, or guard an individual's privacy, it has become evident that all are vulnerable to one form of electronic attack or another and that in orde...
Gespeichert in:
Veröffentlicht in: | International journal of advanced research in computer science 2012-07, Vol.3 (4) |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 4 |
container_start_page | |
container_title | International journal of advanced research in computer science |
container_volume | 3 |
creator | Onwudebelu, Ugochukwu Akpojaro, Jackson |
description | The essential need for security is apparent to organizations, government and individuals. Whether it is to secure a company's assets, abide by a law, or guard an individual's privacy, it has become evident that all are vulnerable to one form of electronic attack or another and that in order to protect sensitive information, all possible security precautions must be taken to limit any form of authorized access to electronic records or computer-related equipment. In this security-conscious era, we spend huge sums on technology to protect our computer networks and data. As IT security spending has increased so also has the number of successful attacks. This paper has been developed to highlight the fact that we all have an 'electronic life' which is been hunted by social engineers, and provides a solution on how this life can be protected. The purpose is to provide organizations and individual a simple solution for increasing security awareness against social engineering attacks towards their critical information. |
format | Article |
fullrecord | <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_1443735834</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3105354501</sourcerecordid><originalsourceid>FETCH-proquest_journals_14437358343</originalsourceid><addsrcrecordid>eNqNjLEKwjAURYMgWLT_8MC5UEnaGjeRioKDUCeXUkJaUmui76WDf28EB0fvcodzOBMWpbLIkyyXxYzFRH0axqXMRRqxazlo5dFZo6DSakTjX3AkGjVt4IzOB2psB25E-FFPptXQortD5ZRpBihtZ6zW-HG33jfqRgs2bZuBdPz9OVvuy8vukDzQPUPf132o2oDqlRC84NmaC_6f9QZbs0Lk</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1443735834</pqid></control><display><type>article</type><title>Electronic Security Issues: Protecting our Electronic Life from Social Engineering Attacks</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Onwudebelu, Ugochukwu ; Akpojaro, Jackson</creator><creatorcontrib>Onwudebelu, Ugochukwu ; Akpojaro, Jackson</creatorcontrib><description>The essential need for security is apparent to organizations, government and individuals. Whether it is to secure a company's assets, abide by a law, or guard an individual's privacy, it has become evident that all are vulnerable to one form of electronic attack or another and that in order to protect sensitive information, all possible security precautions must be taken to limit any form of authorized access to electronic records or computer-related equipment. In this security-conscious era, we spend huge sums on technology to protect our computer networks and data. As IT security spending has increased so also has the number of successful attacks. This paper has been developed to highlight the fact that we all have an 'electronic life' which is been hunted by social engineers, and provides a solution on how this life can be protected. The purpose is to provide organizations and individual a simple solution for increasing security awareness against social engineering attacks towards their critical information.</description><identifier>EISSN: 0976-5697</identifier><language>eng</language><publisher>Udaipur: International Journal of Advanced Research in Computer Science</publisher><subject>Computer science ; Cybercrime ; Engineering ; Engineers ; Hackers ; Identity theft ; Network security ; Security systems</subject><ispartof>International journal of advanced research in computer science, 2012-07, Vol.3 (4)</ispartof><rights>Copyright International Journal of Advanced Research in Computer Science Jul 2012</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784</link.rule.ids></links><search><creatorcontrib>Onwudebelu, Ugochukwu</creatorcontrib><creatorcontrib>Akpojaro, Jackson</creatorcontrib><title>Electronic Security Issues: Protecting our Electronic Life from Social Engineering Attacks</title><title>International journal of advanced research in computer science</title><description>The essential need for security is apparent to organizations, government and individuals. Whether it is to secure a company's assets, abide by a law, or guard an individual's privacy, it has become evident that all are vulnerable to one form of electronic attack or another and that in order to protect sensitive information, all possible security precautions must be taken to limit any form of authorized access to electronic records or computer-related equipment. In this security-conscious era, we spend huge sums on technology to protect our computer networks and data. As IT security spending has increased so also has the number of successful attacks. This paper has been developed to highlight the fact that we all have an 'electronic life' which is been hunted by social engineers, and provides a solution on how this life can be protected. The purpose is to provide organizations and individual a simple solution for increasing security awareness against social engineering attacks towards their critical information.</description><subject>Computer science</subject><subject>Cybercrime</subject><subject>Engineering</subject><subject>Engineers</subject><subject>Hackers</subject><subject>Identity theft</subject><subject>Network security</subject><subject>Security systems</subject><issn>0976-5697</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2012</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNqNjLEKwjAURYMgWLT_8MC5UEnaGjeRioKDUCeXUkJaUmui76WDf28EB0fvcodzOBMWpbLIkyyXxYzFRH0axqXMRRqxazlo5dFZo6DSakTjX3AkGjVt4IzOB2psB25E-FFPptXQortD5ZRpBihtZ6zW-HG33jfqRgs2bZuBdPz9OVvuy8vukDzQPUPf132o2oDqlRC84NmaC_6f9QZbs0Lk</recordid><startdate>20120701</startdate><enddate>20120701</enddate><creator>Onwudebelu, Ugochukwu</creator><creator>Akpojaro, Jackson</creator><general>International Journal of Advanced Research in Computer Science</general><scope>3V.</scope><scope>7SC</scope><scope>7XB</scope><scope>8AL</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>20120701</creationdate><title>Electronic Security Issues: Protecting our Electronic Life from Social Engineering Attacks</title><author>Onwudebelu, Ugochukwu ; Akpojaro, Jackson</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-proquest_journals_14437358343</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Computer science</topic><topic>Cybercrime</topic><topic>Engineering</topic><topic>Engineers</topic><topic>Hackers</topic><topic>Identity theft</topic><topic>Network security</topic><topic>Security systems</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Onwudebelu, Ugochukwu</creatorcontrib><creatorcontrib>Akpojaro, Jackson</creatorcontrib><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Computing Database (Alumni Edition)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>International journal of advanced research in computer science</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Onwudebelu, Ugochukwu</au><au>Akpojaro, Jackson</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Electronic Security Issues: Protecting our Electronic Life from Social Engineering Attacks</atitle><jtitle>International journal of advanced research in computer science</jtitle><date>2012-07-01</date><risdate>2012</risdate><volume>3</volume><issue>4</issue><eissn>0976-5697</eissn><abstract>The essential need for security is apparent to organizations, government and individuals. Whether it is to secure a company's assets, abide by a law, or guard an individual's privacy, it has become evident that all are vulnerable to one form of electronic attack or another and that in order to protect sensitive information, all possible security precautions must be taken to limit any form of authorized access to electronic records or computer-related equipment. In this security-conscious era, we spend huge sums on technology to protect our computer networks and data. As IT security spending has increased so also has the number of successful attacks. This paper has been developed to highlight the fact that we all have an 'electronic life' which is been hunted by social engineers, and provides a solution on how this life can be protected. The purpose is to provide organizations and individual a simple solution for increasing security awareness against social engineering attacks towards their critical information.</abstract><cop>Udaipur</cop><pub>International Journal of Advanced Research in Computer Science</pub><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | EISSN: 0976-5697 |
ispartof | International journal of advanced research in computer science, 2012-07, Vol.3 (4) |
issn | 0976-5697 |
language | eng |
recordid | cdi_proquest_journals_1443735834 |
source | EZB-FREE-00999 freely available EZB journals |
subjects | Computer science Cybercrime Engineering Engineers Hackers Identity theft Network security Security systems |
title | Electronic Security Issues: Protecting our Electronic Life from Social Engineering Attacks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T03%3A29%3A08IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Electronic%20Security%20Issues:%20Protecting%20our%20Electronic%20Life%20from%20Social%20Engineering%20Attacks&rft.jtitle=International%20journal%20of%20advanced%20research%20in%20computer%20science&rft.au=Onwudebelu,%20Ugochukwu&rft.date=2012-07-01&rft.volume=3&rft.issue=4&rft.eissn=0976-5697&rft_id=info:doi/&rft_dat=%3Cproquest%3E3105354501%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1443735834&rft_id=info:pmid/&rfr_iscdi=true |